Skip to main content
  • Conference proceedings
  • © 2007

Computational Science and Its Applications - ICCSA 2007

International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4706)

Part of the book sub series: Theoretical Computer Science and General Issues (LNTCS)

Conference series link(s): ICCSA: International Conference on Computational Science and Its Applications

Conference proceedings info: ICCSA 2007.

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (99 papers)

  1. Front Matter

  2. Workshop on High-Performance Computing and Information Visualization (HPCIV 07)

    1. Parallel Solution of High Speed Low Order FDTD on 2D Free Space Wave Propagation

      • Mohammad Khatim Hasan, Mohamed Othman, Zulkifly Abbas, Jumat Sulaiman, Fatimah Ahmad
      Pages 13-24
    2. Adaptive Scheduling of Parallel Computations for SPMD Tasks

      • Mikhail Panshenskov, Alexander Vakhitov
      Pages 38-50
  3. Workshop on Intelligence and Security Informatics (ISI 07)

    1. Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures

      • In Jung Kim, Cheol-Won Lee, Eul Gyu Im
      Pages 75-84
    2. Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines

      • Wahyudi Martono, Hasimah Ali, Momoh Jimoh E. Salami
      Pages 85-93
    3. An Efficient Iteration Decoding Stopping Criterion for Turbo Codes

      • Byoung-Sup Shim, Hyoung-Keun Park, Sun-Youb Kim, Yu-Chan Ra
      Pages 104-112
    4. Efficient an Implementation Method Research of a Smart Card Atomic Operation

      • Eun A. Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim
      Pages 113-121
    5. Mobile Agent Based Intrusion Detection System Adopting Hidden Markov Model

      • Do-hyeon Lee, Doo-young Kim, Jae-il Jung
      Pages 122-130
    6. Location-Aided Secure Routing Scheme in Mobile Ad Hoc Networks

      • Do-hyeon Lee, Sun Choi, Ji-hyeon Choi, Jae-il Jung
      Pages 131-139
    7. A Design of Fair Blind Signatures Protocol Using PVNIOT

      • Jeom-goo Kim, Do-hyeon Lee, Jeog-bae Lee
      Pages 140-147
    8. Security and Test Environment for SIP

      • Geuk Lee, Seok Tae Kim, In Kyu Han, Chang Yong Lee, Seon Ho Park, Do Won Yi et al.
      Pages 157-165
    9. Simulation Based Nodal Analysis for Effects Based Operations

      • Gang Taek Lee, Dong Hwi Lee, Kuinam J. Kim
      Pages 166-176
    10. A Stable Evidence Collection Procedure of a Volatile Data in Research

      • Yong-Ho Kim, Dong Hwi Lee, Kuinam J. Kim
      Pages 177-184

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access